Xiaohui Gu

Works (33)

Updated: April 5th, 2024 05:27

2023 journal article

Performance Bug Analysis and Detection for Distributed Storage and Computing Systems

ACM TRANSACTIONS ON STORAGE, 19(3).

author keywords: Storage and computing systems performance; blocking bugs
TL;DR: An automatic detection tool called PCatch is designed and performed to identify code regions whose execution time can potentially increase dramatically with the workload size, and adapts the traditional happens-before model to reason about software resource contention and performance dependency relationship. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2022 article

PerfSig: Extracting Performance Bug Signatures via Multi-modality Causal Analysis

2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), pp. 1669–1680.

By: J. He*, Y. Lin n, X. Gu n, C. Yeh* & Z. Zhuang*

author keywords: Debugging; Bug signatures; Software reliability; Performance
TL;DR: The experimental results show that PerfSig captures various kinds of fine-grained anomaly patterns from different machine data and successfully identifies the root cause functions through multi-modality causal analysis for 19 out of 20 tested performance bugs. (via Semantic Scholar)
Source: Web Of Science
Added: August 29, 2022

2022 article

SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications

2022 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS (ACSOS 2022), pp. 41–50.

By: Y. Lin n, O. Tunde-Onadele n, X. Gu n, J. He* & H. Latapie

author keywords: Container Security; Security Attack Detection; Hybrid Machine Learning
TL;DR: SHIL is presented, a self-supervised hybrid learning solution, which combines unsupervised and supervised learning methods to achieve high accuracy without requiring any manual data labelling and can reduce false alarms by 39-91%. (via Semantic Scholar)
Source: Web Of Science
Added: December 19, 2022

2022 article

Understanding Software Security Vulnerabilities in Cloud Server Systems

2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2022), pp. 245–252.

By: O. Tunde-Onadele n, Y. Lin n, X. Gu n & J. He*

author keywords: Cloud Security; Vulnerability Detection; Bug Study
TL;DR: This paper conducts a systematic study over 110 software security vulnera-bilities in 13 popular cloud server systems and extracts principal vulnerable code patterns from those common vulnerability categories. (via Semantic Scholar)
Source: Web Of Science
Added: December 19, 2022

2020 article

CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 179–188.

By: Y. Lin n, O. Tunde-Onadele n & X. Gu n

author keywords: Container Security; Anomaly Detection; Machine Learning
TL;DR: By introducing application classification into container behavior learning, CDL can improve the detection rate from catching 20 attacks to 31 attacks before those attacks succeed and reduce the false positive rate from over 12% to 0.24% compared to traditional anomaly detection schemes. (via Semantic Scholar)
Source: Web Of Science
Added: September 13, 2021

2020 article

Self-Patch: Beyond Patch Tuesday for Containerized Applications

2020 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS (ACSOS 2020), pp. 21–27.

By: O. Tunde-Onadele n, Y. Lin n, J. He n & X. Gu n

author keywords: Container Security; Anomaly Detection; Security Patching
TL;DR: Self-Patch is presented, a new self-triggering patching framework for applications running inside containers that combines light-weight runtime attack detection and dynamic targeted patching to achieve more efficient and effective security protection for containerized applications. (via Semantic Scholar)
Source: Web Of Science
Added: November 29, 2021

2019 article

A Study on Container Vulnerability Exploit Detection

2019 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), pp. 121–127.

By: O. Tunde-Onadele n, J. He n, T. Dai n & X. Gu n

author keywords: Container Security; Anomaly Detection; Machine Learning
TL;DR: This paper implements and evaluates a set of static and dynamic vulnerability attack detection schemes using 28 real world vulnerability exploits that widely exist in docker images and shows that the static vulnerability scanning scheme only detects 3 out of 28 tested vulnerabilities and dynamic anomaly detection schemes detect 22 vulnerability exploits. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: January 6, 2020

2019 article

FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric

2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), pp. 543–555.

By: H. Kang, T. Dai n, N. Jean-Louis, S. Tao & X. Gu n

author keywords: Blockchain; privacy; auditability; zero-knowledge proofs
TL;DR: FabZK conceals transaction details on a shared ledger by storing only encrypted data from each transaction, and by anonymizing the transactional relationship between members in a Blockchain network. (via Semantic Scholar)
Source: Web Of Science
Added: September 28, 2020

2019 journal article

Hytrace: A Hybrid Approach to Performance Bug Diagnosis in Production Cloud Infrastructures

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 30(1), 107–118.

By: T. Dai n, D. Dean*, P. Wang n, X. Gu n & S. Lu*

author keywords: Static analysis; dynamic analysis; reliability; availability; and serviceability; debugging aids; performance
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: January 7, 2019

2019 article

TFix: Automatic Timeout Bug Fixing in Production Server Systems

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), pp. 612–623.

By: J. He n, T. Dai n & X. Gu n

TL;DR: TFix is presented, an automatic timeout bug fixing system for correcting misused timeout bugs in production systems that adopts a drill-down bug analysis protocol that can narrow down the root cause of a misusedtimeout bug and producing recommendations for correcting theRoot cause. (via Semantic Scholar)
Source: Web Of Science
Added: September 21, 2020

2018 article

DScope: Detecting Real-World Data Corruption Hang Bugs in Cloud Server Systems

PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '18), pp. 313–325.

By: T. Dai n, J. He n, X. Gu n, S. Lu* & P. Wang n

author keywords: static analysis; data corruption; performance bug detection
TL;DR: DScope, a tool that statically detects data-corruption related software hang bugs in cloud server systems, and identifies loops whose exit conditions can be affected by I/O operations through returned data, returned error code, orI/O exception handling. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: March 4, 2019

2018 article

PCatch: Automatically Detecting Performance Cascading Bugs in Cloud Systems

EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE.

By: J. Li*, Y. Chen*, H. Liu*, S. Lu*, Y. Zhang, H. Gunawi*, X. Gu n, X. Lu, D. Li

author keywords: Performance Bugs; Cascading problems; Distributed Systems; Bug Detection; Cloud Computing
TL;DR: Evaluation using representative distributed systems, Cassandra, Hadoop MapReduce, HBase, and HDFS, shows that PCatch can accurately predict PCbugs based on small-scale workload execution. (via Semantic Scholar)
Source: Web Of Science
Added: March 25, 2019

2018 article

TScope: Automatic Timeout Bug Identification for Server Systems

15TH IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC 2018), pp. 1–10.

By: J. He*, T. Dai* & X. Gu*

TL;DR: TScope leverages kernel-level system call tracing and machine learning based anomaly detection and feature extraction schemes to achieve timeout bug identification and introduces a unique system call selection scheme to achieve higher accuracy than existing generic performance bug detection tools. (via Semantic Scholar)
Source: Web Of Science
Added: December 3, 2018

2017 article

Hytrace: A Hybrid Approach to Performance Bug Diagnosis in Production Cloud Infrastructures

PROCEEDINGS OF THE 2017 SYMPOSIUM ON CLOUD COMPUTING (SOCC '17), pp. 641–641.

By: T. Dai n, D. Dean*, P. Wang n, X. Gu n & S. Lu*

author keywords: Hybrid analysis; performance bug diagnosis
TL;DR: Hytrace combines rule-based static analysis and runtime inference techniques to achieve higher bug localization accuracy than pure-static and pure-dynamic approaches for performance bugs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

A Study of Security Isolation Techniques

ACM COMPUTING SURVEYS, 49(3).

By: R. Shu n, P. Wang n, S. Gorski n, B. Andow n, A. Nadkarni n, L. Deshotels n, J. Gionta n, W. Enck n, X. Gu n

author keywords: Security isolation; access control; resilient architectures
TL;DR: This article provides a hierarchical classification structure for grouping different security isolation techniques by systematically classifying different approaches and analyzing their properties. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2016 journal article

PerfCompass: Online Performance Anomaly Fault Localization and Inference in Infrastructure-as-a-Service Clouds

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 27(6), 1742–1755.

By: D. Dean n, H. Nguyen n, P. Wang n, X. Gu n, A. Sailer* & A. Kochut*

author keywords: Reliability, availability, and serviceability; debugging aids; distributed debugging; performance
TL;DR: PerfCompass is presented, an online performance anomaly fault debugging tool that can quantify whether a production-run performance anomaly has a global impact or local impact and provides useful diagnosis hints within several minutes and imposes negligible runtime overhead to the production system during normal execution time. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Performance analysis of a multi-tenant in-memory data grid

Proceedings of 2016 ieee 9th international conference on cloud computing (cloud), 956–959.

By: A. Das n, F. Mueller n, X. Gu n & A. Iyengar

TL;DR: This study suggests that processing increasing number of client requests spawning fewer number of threads help improve performance, and uncovers scenarios of performance degradation followed by optimized performance via end-point multiplexing. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

RDE: Replay DEbugging for Diagnosing Production Site Failures

Proceedings of 2016 ieee 35th symposium on reliable distributed systems (srds), 327–336.

By: P. Wang n, H. Nguyen n, X. Gu n & S. Lu*

TL;DR: RDE is presented, a Replay DEbug system that can replay a production-site failure at the development site within an interactive debugging environment without requiring user inputs and can successfully replay all the tested bugs within GDB. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?

2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, pp. 127–132.

By: D. Dean n, P. Wang n, X. Gu n, W. Enck n & G. Jin n

Event: IEEE

author keywords: hang bugs; characteristic study; performance
TL;DR: This paper presents a characteristic study of 177 real software hang bugs from 8 common open source server systems and describes two major problems while applying existing rule-based bug detection techniques to those bugs. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2015 article

Understanding Real World Data Corruptions in Cloud Systems

2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), pp. 116–125.

By: P. Wang n, D. Dean n & X. Gu n

TL;DR: A comprehensive study on 138 real world data corruption incidents reported in Hadoop bug repositories finds the impact of data corruption is not limited to data integrity, and existing data corruption detection schemes are quite insufficient. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2014 journal article

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(3), 730–739.

By: J. Du*, D. Dean n, Y. Tan*, X. Gu* & T. Yu n

author keywords: Distributed service integrity attestation; cloud computing; secure distributed data processing
TL;DR: The experimental results show that IntTest can achieve higher attacker pinpointing accuracy than existing approaches, and does not require any special hardware or secure kernel support and imposes little performance impact to the application, which makes it practical for large-scale cloud systems. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2013 article

FChain: Toward Black-box Online Fault Localization for Cloud Systems

2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 21–30.

By: H. Nguyen n, Z. Shen n, Y. Tan* & X. Gu n

TL;DR: A black-box online fault localization system called FChain that can pinpoint faulty components immediately after a performance anomaly is detected and can achieve up to 90% higher precision and 20% higher recall than existing schemes. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2013 journal article

resilient self-compressive monitoring for large-scale hosting infrastructures

IEEE Transactions on Parallel and Distributed Systems, 24(3), 576–586.

By: Y. Tan*, V. Venkatesh* & X. Gu n

TL;DR: The design and implementation of a Resilient self-Compressive Monitoring (RCM) system for large-scale hosting infrastructures is presented and experimental results show that RCM can achieve up to 200 percent higher compression ratio and several orders of magnitude less overhead than the existing approaches. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (Web of Science; OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2012 article

PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems

2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 285–294.

By: Y. Tan n, H. Nguyen n, Z. Shen n, X. Gu n, C. Venkatramani* & D. Rajan*

author keywords: performance anomaly prevention; online anomaly prediction; cloud computing
TL;DR: PREPARE integrates online anomaly prediction, learning-based cause inference, and predictive prevention actuation to minimize the performance anomaly penalty without human intervention. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2011 article

ELT: Efficient Log-based Troubleshooting System for Cloud Computing Infrastructures

2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), pp. 11–20.

By: K. Kc n & X. Gu n

TL;DR: The experimental results show that ELT can achieve more efficient and powerful troubleshooting support than existing schemes and can find software bugs that cannot be detected by current cloud system management practice. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2010 article

Adaptive System Anomaly Prediction for Large-Scale Hosting Infrastructures

PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 173–182.

By: Y. Tan n, X. Gu n & H. Wang*

author keywords: Anomaly Prediction; Context-aware Prediction Model
TL;DR: This paper proposes a novel context-aware anomaly prediction scheme, called ALERT, to improve prediction accuracy in dynamic hosting infrastructures and shows that ALERT can achieve high prediction accuracy for a range of system anomalies and impose low overhead to the hosting infrastructure. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Online anomaly prediction for robust cluster systems

Icde: 2009 ieee 25th international conference on data engineering, vols 1-3, 1000–1011.

By: X. Gu n & H. Wang*

TL;DR: This work provides the first stream-based mining algorithm for predicting system anomalies and combines Markov models and Bayesian classification methods to predict when a system anomaly will appear in the foreseeable future and what are the possible anomaly causes. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

QoS-Aware Shared Component Composition for Distributed Stream Processing Systems

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 20(7), 968–982.

By: T. Repantis*, X. Gu n & V. Kalogeraki*

author keywords: Distributed stream processing; component composition; shared processing; QoS; resource management
TL;DR: Experimental results show that Synergy can achieve much better resource utilization and QoS provisioning than previously proposed schemes, by judiciously sharing streams and components during application composition. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

SecureMR: A Service Integrity Assurance Framework for Map Reduce

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82.

By: W. Wei n, J. Du n, T. Yu n & X. Gu n

TL;DR: The proposed SecureMR consists of five security components, which provide a set of practical security mechanisms that not only ensure MapReduce service integrity as well as to prevent replay and Denial of Service (DoS) attacks, but also preserve the simplicity, applicability and scalability of Map Reduce. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

SigLM: signature-driven load management for cloud computing infrastructures

Iwqos: 2009 ieee 17th international workshop on quality of service, 226–234.

By: Z. Gong, P. Ramaswamy, X. Gu & X. Ma

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

peerTalk: A peer-to-peer multiparty voice-over-IP system

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 19(4), 515–528.

By: X. Gu n, Z. Wen*, P. Yu* & Z. Shae*

author keywords: peer-to-peer streaming; voice-over-IP; adaptive system; service overlay network; quality-of-service; failure resilience
TL;DR: The initial implementation of the peerTalk system demonstrates the feasibility of the approach and shows promising results: peerTalk can outperform existing approaches such as P2P overlay multicast and coupled distributed processing for providing MVolP services. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2006 chapter

Synergy: Sharing-Aware Component Composition for Distributed Stream Processing Systems

In Lecture Notes in Computer Science (pp. 322–341).

By: T. Repantis*, X. Gu* & V. Kalogeraki*

TL;DR: Experimental results show that Synergy can achieve much better resource utilization and QoS provision than previously proposed schemes, by judiciously sharing streams and processing components during application composition. (via Semantic Scholar)
Source: Crossref
Added: June 6, 2020

2005 chapter

Adaptive Load Diffusion for Stream Joins

In Middleware 2005 (pp. 411–420).

By: X. Gu* & P. Yu*

TL;DR: A novel load diffusion system is presented to enable scalable execution of resource-intensive stream joins using an ensemble of server hosts and can achieve fine-grained load sharing in the distributed stream processing system. (via Semantic Scholar)
Source: Crossref
Added: June 6, 2020

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.